(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Related People

Abstract

This invention provides a customer with increased flexibility in his choice of security options provided by personal computers.

Country

United States

Language

English (United States)

This text was extracted from an ASCII text file.

This is the abbreviated version, containing approximately
52% of the total text.

Personal Computer Security Password Control Scheme

This
invention provides a customer with increased flexibility
in his choice of security options provided by personal computers.

Several
previous IBM* Personal Computer models (68x5 and 68x7)
have incorporated a design to prevent the unauthorized access and
modification of passwords as one of their "high security" features.
The design was as follows:

Two levels of passwords are implemented:
1.
A Privileged Operator Password (POP) that must be entered
before the computer will complete
its powerup sequence and
2.
A Privileged Administrator Password (PAP) that must be
entered before a system microcode
update can take place
or any system setup changes (such
as boot device sequence)
can be made. Disabling the Operator Password check is one
of the system setup changes that
is forbidden unless the
PAP is entered.

The
information pertaining to these passwords was stored in a
non-volatile memory device that, once the powerup sequence was
complete, could not be altered or read with any normal customer
accessible means.

Note: Other IBM
designs allow these passwords to be erased by moving
a jumper on the system board.

This design,
while effective for its intended purpose, left
the system open to the possibility of being taken out of service by
1) forgotten or lost passwords or 2) a person with malicious intent
activating the password protection features with unknown passwords.
The only way t...